- NBC Universal (Universal City, CA)
- …but are not limited to: + Cyber Security Defense Ops: The Detection team focuses on threat intelligence gathering, enrichment, correlation. The information ... threat hunting workflow and collaboration, developing emerging threat detection capabilities, and alert validation and...etc. + Understanding of computer security principles and the cyber security threat landscape. + Experience working… more
- Citigroup (Jacksonville, FL)
- …fraud. + Create vision and strategy across three main areas of focus: + Fraud Threat Intelligence + Cyber Fraud + Business/Intelligence Data Analytics + Fraud ... between real and fraudulent customers. To combat the agile threat , the Financial Crimes and Fraud Prevention organization operates...+ Cyber and Intel data modeling + Cyber Fraud capabilities expansion (ie. customer malware detection… more
- Microsoft Corporation (Redmond, WA)
- …5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection , Security Operations Center (SOC) ... Response Plan (SSIRP), by contributing to our critical security operations and performing cyber defense analysis, so that we can continue to protect our customers… more
- Federal Reserve Bank (Washington, DC)
- …in the in at least one of the following areas: cybersecurity operations, cyber threat analysis, data science principles, digital forensics, incident handling, ... : Yes Compensation Grade Low: : FR PAY GRADE 26 Compensation Grade High: : FR PAY GRADE 27...relevant technologies and programming languages. · Ability to provide threat assessments, recommend cybersecurity technologies for intrusion detection… more
- Meta (Columbus, OH)
- …the core infrastructure and take a hands-on role in building solutions. 5. Make threat intelligence actionable by integrating it with existing or novel detection ... or Bash 18. 2. Internet security issues and the threat landscape 19. 3. Host, network and application security...such as DNS, SMTP, and DCHP 22. 6. Addressing cyber threats 23. 7. Developing and debugging in C,… more
- Microsoft Corporation (Redmond, WA)
- …security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection . **Other Requirements** ... operational teams to execute targeted attacks on these systems, simulating real-world threat scenarios + Develop tools and techniques to scale and accelerate… more
- L3Harris (Santa Rosa, CA)
- …one or more of the following categories: reconnaissance, surveillance, target acquisition, and threat detection in support of weapons, fixed wing and rotary ... advanced defense and commercial technologies across air, land, sea, space and cyber domains\. L3Harris has approximately $17 billion in annual revenue, 50,000… more